US9843564B2 - Securing data using integrated host-based data loss agent with encryption detection - Google Patents
Securing data using integrated host-based data loss agent with encryption detection Download PDFInfo
- Publication number
- US9843564B2 US9843564B2 US14/543,869 US201414543869A US9843564B2 US 9843564 B2 US9843564 B2 US 9843564B2 US 201414543869 A US201414543869 A US 201414543869A US 9843564 B2 US9843564 B2 US 9843564B2
- Authority
- US
- United States
- Prior art keywords
- attachment
- encryption
- data
- data loss
- loss prevention
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Definitions
- the present invention relates to a method and system for data loss prevention, securing data by integrating a host based data loss agent with file and full disk encryption software, as to facilitate the data loss agent with encryption detection abilities.
- Host-based data loss prevention (DLP) agents are used to prevent unauthorized user activities that result in data leaving the organization in a manner that compromises a set security policy.
- User activity is monitored within each host by an application software agent.
- the agent intercepts user activities via software probes that gather information about application requests and provide that information to the agent to determine if the user request should be allowed or blocked.
- Data loss incidents can be of many forms, such as file copy, email, web posting and printing of sensitive content.
- Host-based DLP agents are used to manage devices by blocking removable media devices or setting them as read only according to device parameters and a security policy.
- a DLP agent may also allow a device to work, but, detect and prevent data loss by analyzing the contents of files written to the removable device, and prevent only files containing sensitive data from being written. The same applies to other channels of data loss such as email, network connectivity, web, etc.
- the data loss agent will query the encryption software for encryption detection.
- the data loss agent may check if a connected device is currently encrypted, or if the encryption software policy forces encryption of any data written to the device.
- the data loss agent may also check if files that are about to be written to removable storage are encrypted. It may allow only such files to be written and block plain text files. The same mechanism may be provided for other data loss channels such as emails, instant messaging, etc.
- a method for securing data in a computer system comprises detecting attempted connection or access to a data destination to which sensitive data may be written, determining an encryption status of the data destination, allowing the connection or access to the data destination when the data destination is encrypted, and taking action to secure the sensitive data when the data destination is not encrypted.
- the data destination may comprise a removable device and the encryption status is determined based on attributes of the removable device or data on the removable device. The encryption status may further be determined by examining blocks and/or sectors written on the device and comparing them by reading the data with the operating system's file reading interface to determine whether or not they are encrypted.
- the data destination may comprise a removable device and the encryption status is determined based on an encryption policy for the removable device.
- FIG. 1 is an exemplary block diagram of a software environment, such as in a host computer system, in which the present invention may be implemented.
- FIG. 2 is an exemplary flow diagram of a process of securing data on a removable device when such a device is connected to a host computer system.
- FIG. 3 is an exemplary flow diagram of a process of securing data on a removable device when data is to be written to the device.
- FIG. 4 is an exemplary flow diagram of process of securing data attached to email messages.
- FIG. 5 is an exemplary block diagram of a computer system, in which the present invention may be implemented.
- the present invention provides a method and system for data loss prevention, and more particularly to a method of protecting sensitive data once the data is required to leave the boundaries of the organization by means of encryption.
- the system includes software agents on host machines that enforce a security policy and determine when files are copied to removable storage. The agents examine various criteria to determine if the file copy is allowed and if the contents of the copied files contains sensitive data
- DLP agent 102 is software that is typically installed on all computers in an organization. DLP agent 102 , in conjunction with DLP file filter driver 106 , intercepts all requests to access removable device 116 and allows them to proceed only if they comply with security policy 110 .
- Security policy 110 is the definition of security for software environment 100 , and may also define security for one or more systems, organizations or other entities associated with software environment 100 .
- security policy 110 addresses the constraints on behavior of its members as well as constraints imposed on adversaries by mechanisms such as doors, locks, keys and walls.
- security policy 110 addresses constraints on functions and flow among them, constraints on access by external systems and adversaries including programs and access to data by people.
- Process 400 begins with step 402 , in which DLP agent 102 detects that an email containing attachments is being sent by email software.
- DLP agent 102 inspects the contents or other attributes of the attachments as to determine if they contain sensitive data.
- step 406 if the attachments are sensitive, DLP agent 102 queries encryption software 104 to determine if the attachments are encrypted.
- step 408 if the attachments are not identified as encrypted, DLP agent 102 takes action to secure the sensitive data, such as by blocking the email software from sending the email.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (13)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/543,869 US9843564B2 (en) | 2008-03-14 | 2014-11-17 | Securing data using integrated host-based data loss agent with encryption detection |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/076,163 US8893285B2 (en) | 2008-03-14 | 2008-03-14 | Securing data using integrated host-based data loss agent with encryption detection |
US14/543,869 US9843564B2 (en) | 2008-03-14 | 2014-11-17 | Securing data using integrated host-based data loss agent with encryption detection |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/076,163 Continuation US8893285B2 (en) | 2008-03-14 | 2008-03-14 | Securing data using integrated host-based data loss agent with encryption detection |
Publications (2)
Publication Number | Publication Date |
---|---|
US20150074405A1 US20150074405A1 (en) | 2015-03-12 |
US9843564B2 true US9843564B2 (en) | 2017-12-12 |
Family
ID=41063048
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/076,163 Active 2030-11-14 US8893285B2 (en) | 2008-03-14 | 2008-03-14 | Securing data using integrated host-based data loss agent with encryption detection |
US14/543,869 Active US9843564B2 (en) | 2008-03-14 | 2014-11-17 | Securing data using integrated host-based data loss agent with encryption detection |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/076,163 Active 2030-11-14 US8893285B2 (en) | 2008-03-14 | 2008-03-14 | Securing data using integrated host-based data loss agent with encryption detection |
Country Status (1)
Country | Link |
---|---|
US (2) | US8893285B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11546355B2 (en) | 2020-07-28 | 2023-01-03 | Bank Of America Corporation | Supplemental attack surface scanner |
US11645404B2 (en) | 2007-09-05 | 2023-05-09 | Mcafee, Llc | System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session |
Families Citing this family (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8590002B1 (en) | 2006-11-29 | 2013-11-19 | Mcafee Inc. | System, method and computer program product for maintaining a confidentiality of data on a network |
US8621008B2 (en) | 2007-04-26 | 2013-12-31 | Mcafee, Inc. | System, method and computer program product for performing an action based on an aspect of an electronic mail message thread |
US8199965B1 (en) | 2007-08-17 | 2012-06-12 | Mcafee, Inc. | System, method, and computer program product for preventing image-related data loss |
US8446607B2 (en) | 2007-10-01 | 2013-05-21 | Mcafee, Inc. | Method and system for policy based monitoring and blocking of printing activities on local and network printers |
US8893285B2 (en) | 2008-03-14 | 2014-11-18 | Mcafee, Inc. | Securing data using integrated host-based data loss agent with encryption detection |
US8918872B2 (en) * | 2008-06-27 | 2014-12-23 | Mcafee, Inc. | System, method, and computer program product for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device |
US9077684B1 (en) | 2008-08-06 | 2015-07-07 | Mcafee, Inc. | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
US8843566B2 (en) * | 2008-08-20 | 2014-09-23 | First Data Corporation | Securing outbound mail |
US8250085B1 (en) * | 2008-12-18 | 2012-08-21 | Symantec Corporation | Method to improve data loss prevention via cross leveraging fingerprints |
US20100180027A1 (en) * | 2009-01-10 | 2010-07-15 | Barracuda Networks, Inc | Controlling transmission of unauthorized unobservable content in email using policy |
US9426179B2 (en) * | 2009-03-17 | 2016-08-23 | Sophos Limited | Protecting sensitive information from a secure data store |
US9116848B1 (en) * | 2009-07-15 | 2015-08-25 | Symantec Corporation | Method of detecting data loss using multiple references to a file in a deduplication backup system |
US8321560B1 (en) * | 2009-08-13 | 2012-11-27 | Symantec Corporation | Systems and methods for preventing data loss from files sent from endpoints |
US8224796B1 (en) * | 2009-09-11 | 2012-07-17 | Symantec Corporation | Systems and methods for preventing data loss on external devices |
US8307134B2 (en) * | 2010-01-15 | 2012-11-06 | Apple Inc. | Multiple communication interfaces on a portable storage device |
DE102010037651B4 (en) * | 2010-09-20 | 2018-02-01 | Kobil Systems Gmbh | Procedure for examining actions with data |
US8416709B1 (en) | 2010-09-28 | 2013-04-09 | Amazon Technologies, Inc. | Network data transmission analysis management |
US8565108B1 (en) | 2010-09-28 | 2013-10-22 | Amazon Technologies, Inc. | Network data transmission analysis |
US8555383B1 (en) | 2010-09-28 | 2013-10-08 | Amazon Technologies, Inc. | Network data transmission auditing |
US9141808B1 (en) * | 2010-10-29 | 2015-09-22 | Symantec Corporation | Data loss prevention |
US9122877B2 (en) | 2011-03-21 | 2015-09-01 | Mcafee, Inc. | System and method for malware and network reputation correlation |
WO2012138804A2 (en) * | 2011-04-04 | 2012-10-11 | Nextlabs, Inc. | Protecting information using policies and encryption |
US8688601B2 (en) | 2011-05-23 | 2014-04-01 | Symantec Corporation | Systems and methods for generating machine learning-based classifiers for detecting specific categories of sensitive information |
US9106680B2 (en) | 2011-06-27 | 2015-08-11 | Mcafee, Inc. | System and method for protocol fingerprinting and reputation correlation |
US9043918B2 (en) * | 2011-10-13 | 2015-05-26 | Mcafee, Inc. | System and method for profile based filtering of outgoing information in a mobile environment |
US8544060B1 (en) * | 2012-01-27 | 2013-09-24 | Symantec Corporation | Method and system for detecting and protecting against potential data loss from unknown applications |
US8931043B2 (en) | 2012-04-10 | 2015-01-06 | Mcafee Inc. | System and method for determining and using local reputations of users and hosts to protect information in a network environment |
US10075471B2 (en) | 2012-06-07 | 2018-09-11 | Amazon Technologies, Inc. | Data loss prevention techniques |
US10084818B1 (en) | 2012-06-07 | 2018-09-25 | Amazon Technologies, Inc. | Flexibly configurable data modification services |
US9286491B2 (en) | 2012-06-07 | 2016-03-15 | Amazon Technologies, Inc. | Virtual service provider zones |
US9779260B1 (en) | 2012-06-11 | 2017-10-03 | Dell Software Inc. | Aggregation and classification of secure data |
TW201427366A (en) * | 2012-12-28 | 2014-07-01 | Ibm | Method and appliance of decrypting files for data leakage protection in an enterprise network |
US9141811B2 (en) * | 2013-08-01 | 2015-09-22 | Dropbox, Inc. | Coerced encryption on connected devices |
CN104036197B (en) * | 2014-06-05 | 2017-02-15 | 哈尔滨工程大学 | Vector map data protection and access control method based on file filter driver |
US9584492B2 (en) * | 2014-06-23 | 2017-02-28 | Vmware, Inc. | Cryptographic proxy service |
US9537833B2 (en) | 2014-12-31 | 2017-01-03 | Google Inc. | Secure host communications |
US9760727B2 (en) * | 2014-12-31 | 2017-09-12 | Google Inc. | Secure host interactions |
US9547773B2 (en) | 2014-12-31 | 2017-01-17 | Google Inc. | Secure event log management |
US10326748B1 (en) | 2015-02-25 | 2019-06-18 | Quest Software Inc. | Systems and methods for event-based authentication |
US10412106B2 (en) * | 2015-03-02 | 2019-09-10 | Verizon Patent And Licensing Inc. | Network threat detection and management system based on user behavior information |
US10417613B1 (en) | 2015-03-17 | 2019-09-17 | Quest Software Inc. | Systems and methods of patternizing logged user-initiated events for scheduling functions |
US10114966B2 (en) | 2015-03-19 | 2018-10-30 | Netskope, Inc. | Systems and methods of per-document encryption of enterprise information stored on a cloud computing service (CCS) |
US9842220B1 (en) | 2015-04-10 | 2017-12-12 | Dell Software Inc. | Systems and methods of secure self-service access to content |
US10536352B1 (en) | 2015-08-05 | 2020-01-14 | Quest Software Inc. | Systems and methods for tuning cross-platform data collection |
US10157358B1 (en) | 2015-10-05 | 2018-12-18 | Quest Software Inc. | Systems and methods for multi-stream performance patternization and interval-based prediction |
US10218588B1 (en) | 2015-10-05 | 2019-02-26 | Quest Software Inc. | Systems and methods for multi-stream performance patternization and optimization of virtual meetings |
US11403418B2 (en) | 2018-08-30 | 2022-08-02 | Netskope, Inc. | Enriching document metadata using contextual information |
US10142391B1 (en) | 2016-03-25 | 2018-11-27 | Quest Software Inc. | Systems and methods of diagnosing down-layer performance problems via multi-stream performance patternization |
CN108399341B (en) * | 2018-01-17 | 2020-10-30 | 中国地质大学(武汉) | A Windows dual file management and control system based on mobile terminal |
US11989328B2 (en) * | 2018-06-11 | 2024-05-21 | Grey Market Labs, PBC | Embedded device for control of data exposure |
US11068605B2 (en) | 2018-06-11 | 2021-07-20 | Grey Market Labs, PBC | Systems and methods for controlling data exposure using artificial-intelligence-based periodic modeling |
US10558823B2 (en) | 2018-06-11 | 2020-02-11 | Grey Market Labs, PBC | Systems and methods for controlling data exposure using artificial-intelligence-based modeling |
US10282553B1 (en) | 2018-06-11 | 2019-05-07 | Grey Market Labs, PBC | Systems and methods for controlling data exposure using artificial-intelligence-based modeling |
US11416641B2 (en) | 2019-01-24 | 2022-08-16 | Netskope, Inc. | Incident-driven introspection for data loss prevention |
US11775670B2 (en) * | 2021-04-15 | 2023-10-03 | Proofpoint, Inc. | System and method for light data file duplication prevention |
US11475158B1 (en) | 2021-07-26 | 2022-10-18 | Netskope, Inc. | Customized deep learning classifier for detecting organization sensitive data in images on premises |
Citations (207)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4797447A (en) | 1985-08-16 | 1989-01-10 | Shell Oil Company | Impact resistant blends of thermoplastic polyesters and modified block copolymers |
US5195086A (en) | 1990-04-12 | 1993-03-16 | At&T Bell Laboratories | Multiple call control method in a multimedia conferencing system |
US5280527A (en) | 1992-04-14 | 1994-01-18 | Kamahira Safe Co., Inc. | Biometric token for authorizing access to a host system |
US5485068A (en) | 1993-03-15 | 1996-01-16 | Vaught; Michael | Multiple plug-in programmable sensory device system |
US5572694A (en) | 1992-11-25 | 1996-11-05 | Fujitsu Limited | Virtual system for detecting access paths belonging to same group from plurality of access paths to reach device designated by command with reference to table |
US5796948A (en) | 1996-11-12 | 1998-08-18 | Cohen; Elliot D. | Offensive message interceptor for computers |
US5941915A (en) | 1997-02-18 | 1999-08-24 | Cummins Engine Company, Inc. | System for providing accurately time stamped vehicle operational messages following a real-time clock reset |
US5987610A (en) | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems |
US6073142A (en) | 1997-06-23 | 2000-06-06 | Park City Group | Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments |
US6081265A (en) | 1996-08-30 | 2000-06-27 | Hitachi, Ltd. | System for providing a same user interface and an appropriate graphic user interface for computers having various specifications |
US6177932B1 (en) | 1998-08-21 | 2001-01-23 | Kana Communications, Inc. | Method and apparatus for network based customer service |
US6240417B1 (en) | 1997-08-13 | 2001-05-29 | Avaya Technology Corp. | Integration of legacy database management systems with ODBC-compliant application programs |
US20010046069A1 (en) | 2000-02-19 | 2001-11-29 | Jones Kevin C. | Digital watermarks as a gateway and control mechanism |
US6367019B1 (en) | 1999-03-26 | 2002-04-02 | Liquid Audio, Inc. | Copy security for portable music players |
US20020046275A1 (en) | 2000-06-12 | 2002-04-18 | Mark Crosbie | System and method for host and network based intrusion detection and response |
US20020046575A1 (en) | 2000-08-21 | 2002-04-25 | Hayes Dan M. | Apparatus and method for conveying gobs of glass to a glass container forming machine |
US20020083003A1 (en) | 2000-09-26 | 2002-06-27 | Halliday David C. | Method and apparatus for the accurate metering of software application usage and the reporting of such usage to a remote site on a public network |
US20020099944A1 (en) | 2001-01-19 | 2002-07-25 | Bowlin Bradley Allen | Method and apparatus which enable a computer user to prevent unauthorized access to files stored on a computer |
US6460050B1 (en) | 1999-12-22 | 2002-10-01 | Mark Raymond Pace | Distributed content identification system |
US20020157089A1 (en) | 2000-11-06 | 2002-10-24 | Amit Patel | Client installation and execution system for streamed applications |
WO2002093410A1 (en) | 2001-05-15 | 2002-11-21 | Metatomix, Inc. | Methods and apparatus for real-time business visibility using persistent schema-less data storage |
US20030043039A1 (en) | 2001-06-11 | 2003-03-06 | Salemi Robert D. | Concealed security tags on bottles |
US20030046679A1 (en) | 2001-09-05 | 2003-03-06 | Singleton Richard Brian | Checking computer program installation |
US20030065937A1 (en) | 2001-10-03 | 2003-04-03 | Graphin Co., Ltd. | Outside leakage preventing system of confidential information |
US20030070071A1 (en) * | 2001-10-05 | 2003-04-10 | Erik Riedel | Secure file access control via directory encryption |
US20030097583A1 (en) | 2001-11-16 | 2003-05-22 | International Business Machines Corporation | Data management system and method |
US20030105979A1 (en) | 2001-12-05 | 2003-06-05 | Shinji Itoh | Network system enabling transmission control |
US20030133443A1 (en) | 2001-11-02 | 2003-07-17 | Netvmg, Inc. | Passive route control of data networks |
US20030135744A1 (en) | 2002-01-11 | 2003-07-17 | International Business Machines Corporation | Method and system for programming a non-volatile device in a data processing system |
US20030177394A1 (en) | 2001-12-26 | 2003-09-18 | Dmitri Dozortsev | System and method of enforcing executable code identity verification over the network |
US20030182435A1 (en) | 2000-11-13 | 2003-09-25 | Digital Doors, Inc. | Data security system and method for portable device |
US20030192033A1 (en) | 2002-04-04 | 2003-10-09 | Gartside Paul Nicholas | Validating computer program installation |
US6658566B1 (en) | 1997-03-13 | 2003-12-02 | Bull Cp8 | Process for storage and use of sensitive information in a security module and the associated security module |
US20030233421A1 (en) | 2002-06-12 | 2003-12-18 | Sharp Kabushiki Kaisha. | Network communication device, communication device, data reception processing method and data transmission processing method, data transmission processing program and data reception processing program, and computer-readable storage medium |
US20040003255A1 (en) | 2002-06-28 | 2004-01-01 | Storage Technology Corporation | Secure email time stamping |
US20040003289A1 (en) * | 2002-06-27 | 2004-01-01 | International Business Machines Corporation | Method and apparatus for handling files containing confidential or sensitive information |
US20040006715A1 (en) | 2002-07-05 | 2004-01-08 | Skrepetos Nicholas C. | System and method for providing security to a remote computer over a network browser interface |
US20040010686A1 (en) | 2002-04-18 | 2004-01-15 | Cheh Goh | Apparatus for remote working |
US20040027601A1 (en) | 2000-09-22 | 2004-02-12 | Tatsuo Ito | Document acquiring device, document filing system, and electronic document notarizing system |
US20040034794A1 (en) | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US20040054928A1 (en) | 2002-06-17 | 2004-03-18 | Hall Robert J. | Method and device for detecting computer network intrusions |
US20040064732A1 (en) | 2002-06-17 | 2004-04-01 | Hall Robert J. | Method and device for detecting computer intrusion |
US6718367B1 (en) | 1999-06-01 | 2004-04-06 | General Interactive, Inc. | Filter for modeling system and method for handling and routing of text-based asynchronous communications |
US20040088433A1 (en) | 2002-11-06 | 2004-05-06 | Kaler Christopher G. | Maintaining structured time data for electronic messages |
US20040091177A1 (en) | 2002-11-12 | 2004-05-13 | Eaton Eric T. | Limiting storage or transmission of visual information using optical character recognition |
US6741851B1 (en) | 1999-10-30 | 2004-05-25 | Samsung Electronics Co., Ltd. | Method for protecting data stored in lost mobile terminal and recording medium therefor |
US20040111482A1 (en) | 2002-08-13 | 2004-06-10 | Daniela Bourges-Waldegg | Electronic device, method for routing an electronic message from an electronic device to an output unit, and computer program element |
US20040117802A1 (en) | 2002-12-13 | 2004-06-17 | Green James D | Event monitoring system and method |
US20040146006A1 (en) | 2003-01-24 | 2004-07-29 | Jackson Daniel H. | System and method for internal network data traffic control |
US20040172557A1 (en) | 2002-08-20 | 2004-09-02 | Masayuki Nakae | Attack defending system and attack defending method |
US20040193904A1 (en) * | 2003-03-25 | 2004-09-30 | International Business Machines Corporation | Data protection system for removable recording medium |
US20040199596A1 (en) * | 2003-04-03 | 2004-10-07 | Daniel Nutkis | Auditor system |
US20040199555A1 (en) | 2000-03-23 | 2004-10-07 | Albert Krachman | Method and system for providing electronic discovery on computer databases and archives using artificial intelligence to recover legally relevant data |
US20040199566A1 (en) | 2003-03-14 | 2004-10-07 | International Business Machines Corporation | System, method, and apparatus for policy-based data management |
US6820204B1 (en) | 1999-03-31 | 2004-11-16 | Nimesh Desai | System and method for selective information exchange |
US20040230572A1 (en) | 2001-06-22 | 2004-11-18 | Nosa Omoigui | System and method for semantic knowledge retrieval, management, capture, sharing, discovery, delivery and presentation |
US20040255138A1 (en) | 1998-07-29 | 2004-12-16 | Nec Corporation | System and method for distributing digital works, apparatus and method for reproducing digital works, and computer program product |
US20050005145A1 (en) * | 2003-07-02 | 2005-01-06 | Zone Labs, Inc. | System and Methodology Providing Information Lockbox |
US20050004359A1 (en) | 2001-11-16 | 2005-01-06 | Rai Bishwa Prakash | Process for the preparation of crystalline imipenem |
US20050033810A1 (en) | 2003-08-07 | 2005-02-10 | International Business Machines Corporation | Interceptor for non-subscribed bulk electronic messages |
US20050038853A1 (en) | 2001-10-05 | 2005-02-17 | Dominique Blanc | Communication of messages in a system |
US20050044359A1 (en) | 2003-05-12 | 2005-02-24 | Thomas Eriksson | Anti-piracy software protection system and method |
US20050058285A1 (en) | 2003-09-17 | 2005-03-17 | Yosef Stein | Advanced encryption standard (AES) engine with real time S-box generation |
US20050060643A1 (en) | 2003-08-25 | 2005-03-17 | Miavia, Inc. | Document similarity detection and classification system |
US20050116749A1 (en) | 2003-11-28 | 2005-06-02 | Visvesvaraya Pentakota | Low noise output buffer |
US20050131990A1 (en) | 2003-12-04 | 2005-06-16 | Acpana Business Systems Inc. | Data backup system and method |
US20050132184A1 (en) | 2003-12-12 | 2005-06-16 | International Business Machines Corporation | Apparatus, methods and computer programs for controlling performance of operations within a data processing system or network |
US20050154885A1 (en) | 2000-05-15 | 2005-07-14 | Interfuse Technology, Inc. | Electronic data security system and method |
US20050166066A1 (en) | 2004-01-22 | 2005-07-28 | Ratinder Paul Singh Ahuja | Cryptographic policy enforcement |
US20050172140A1 (en) | 2004-01-30 | 2005-08-04 | Matsushita Electric Industrial Co., Ltd. | Encryption device, encryption system including the encryption device, decryption device and a semiconductor system including the decryption device |
US6934857B1 (en) | 2000-11-27 | 2005-08-23 | Networks Associates Technology, Inc. | Security system and method for handheld computers |
GB2411330A (en) | 2004-02-17 | 2005-08-24 | William John Bailey | A means for document security tracking |
US20050198285A1 (en) | 2004-01-27 | 2005-09-08 | Sun Microsystems, Inc. | Overload management in an application-based server |
US20050204009A1 (en) | 2004-03-09 | 2005-09-15 | Devapratim Hazarika | System, method and computer program product for prioritizing messages |
US20050216749A1 (en) | 2004-03-23 | 2005-09-29 | Network Equipment Technologies | Method and apparatus for detection of hostile software |
US6957330B1 (en) | 1999-03-01 | 2005-10-18 | Storage Technology Corporation | Method and system for secure information handling |
US6961765B2 (en) | 2000-04-06 | 2005-11-01 | Bbx Technologies, Inc. | System and method for real time monitoring and control of networked computers |
US20050262208A1 (en) | 2004-05-21 | 2005-11-24 | Eyal Haviv | System and method for managing emails in an enterprise |
US20050272861A1 (en) | 2002-11-27 | 2005-12-08 | Qiao Greg G | Microgel composition and process for preparation thereof |
US20050275861A1 (en) | 2004-06-10 | 2005-12-15 | Ferlitsch Andrew R | Systems and methods for determining when to download a resource to a printing device as part of a print job |
US20050289181A1 (en) | 2004-06-23 | 2005-12-29 | William Deninger | Object classification in a capture system |
US20060005244A1 (en) | 2004-06-10 | 2006-01-05 | International Business Machines Corporation | Virus detection in a network |
US20060010217A1 (en) | 2004-06-04 | 2006-01-12 | Business Instruments Corp. | System and method for dynamic adaptive user-based prioritization and display of electronic messages |
US20060010209A1 (en) | 2002-08-07 | 2006-01-12 | Hodgson Paul W | Server for sending electronics messages |
US20060010150A1 (en) | 1999-05-18 | 2006-01-12 | Kom, Inc. | Method and System for Electronic File Lifecycle Management |
US20060021043A1 (en) | 2003-06-20 | 2006-01-26 | Takashi Kaneko | Method of connection of equipment in a network and network system using same |
US20060026593A1 (en) | 2004-07-30 | 2006-02-02 | Microsoft Corporation | Categorizing, voting and rating community threads |
US20060031359A1 (en) | 2004-05-29 | 2006-02-09 | Clegg Paul J | Managing connections, messages, and directory harvest attacks at a server |
US20060041930A1 (en) | 2004-08-23 | 2006-02-23 | Hafeman Joseph E | Accessing personal information |
US20060039554A1 (en) | 2004-08-18 | 2006-02-23 | Roxio, Inc. | High security media encryption |
US20060050879A1 (en) | 2004-09-09 | 2006-03-09 | Canon Kabushiki Kaisha | Method and apparatus for encrypted print processing |
US20060059548A1 (en) | 2004-09-01 | 2006-03-16 | Hildre Eric A | System and method for policy enforcement and token state monitoring |
US20060070089A1 (en) | 2004-08-20 | 2006-03-30 | Shahid Shoaib | Method and apparatus for dynamic replacement of device drivers in the operating system (OS) kernel |
US7023816B2 (en) | 2000-12-13 | 2006-04-04 | Safenet, Inc. | Method and system for time synchronization |
US20060075040A1 (en) | 2004-09-29 | 2006-04-06 | Mazen Chmaytelli | Message thread handling |
US20060075502A1 (en) | 2004-09-27 | 2006-04-06 | Mcafee, Inc. | System, method and computer program product for accelerating malware/spyware scanning |
US20060112166A1 (en) | 2004-11-19 | 2006-05-25 | Nancy Pettigrew | System and method for disaster recovery and management of an email system |
US20060123479A1 (en) | 2004-12-07 | 2006-06-08 | Sandeep Kumar | Network and application attack protection based on application layer message inspection |
US20060120526A1 (en) | 2003-02-28 | 2006-06-08 | Peter Boucher | Access control to files based on source information |
US20060123413A1 (en) | 2004-11-30 | 2006-06-08 | International Business Machines Corporation | System and method for installing a software application |
US20060132824A1 (en) | 2004-12-22 | 2006-06-22 | Masanori Aritomi | Information processing apparatus and information processing method |
US20060168026A1 (en) | 2004-12-16 | 2006-07-27 | International Business Machines Corporation | System and method enabling interactive electronic mail and real-time messaging |
US20060190986A1 (en) | 2005-01-22 | 2006-08-24 | Mont Marco C | System and method for dynamically allocating resources |
US7100123B1 (en) | 2002-01-25 | 2006-08-29 | Microsoft Corporation | Electronic content search and delivery based on cursor location |
US20060224589A1 (en) | 2005-02-14 | 2006-10-05 | Rowney Kevin T | Method and apparatus for handling messages containing pre-selected data |
US7124197B2 (en) | 2002-09-11 | 2006-10-17 | Mirage Networks, Inc. | Security apparatus and method for local area networks |
US20060248252A1 (en) | 2005-04-27 | 2006-11-02 | Kharwa Bhupesh D | Automatic detection of data storage functionality within a docking station |
US7149778B1 (en) | 2000-08-24 | 2006-12-12 | Yahoo! Inc. | Unsolicited electronic mail reduction |
US20070022285A1 (en) | 2005-07-21 | 2007-01-25 | Guardianedge Technologies, Inc. | Administration of data encryption in enterprise computer systems |
US20070028112A1 (en) | 2005-07-29 | 2007-02-01 | Mackelden John M | Data transfer device |
US20070029744A1 (en) | 2004-06-01 | 2007-02-08 | International Engineering & Manufacturing, Inc. | Snowmobile ski and method |
US20070033283A1 (en) | 2005-08-04 | 2007-02-08 | Brown Murray J | Method and system for managing electronic communication |
US7185238B2 (en) * | 2003-09-30 | 2007-02-27 | Sap Ag | Data loss prevention |
US7194623B1 (en) | 1999-05-28 | 2007-03-20 | Hewlett-Packard Development Company, L.P. | Data event logging in computing platform |
US7194728B1 (en) | 2002-11-18 | 2007-03-20 | Bmc Software, Inc. | System and method for packaging updates |
US20070064883A1 (en) | 2005-07-21 | 2007-03-22 | Lawrence Rosenthal | Techniques for suspended delivery of messages |
US20070074292A1 (en) | 2005-09-28 | 2007-03-29 | Hitachi, Ltd. | Management of encrypted storage networks |
US20070094394A1 (en) | 2005-10-26 | 2007-04-26 | Mona Singh | Methods, systems, and computer program products for transmission control of sensitive application-layer data |
US20070101419A1 (en) | 2005-10-31 | 2007-05-03 | Dawson Colin S | Apparatus, system, and method for providing electronically accessible personal information |
US20070110089A1 (en) | 2003-11-27 | 2007-05-17 | Advestigo | System for intercepting multimedia documents |
US7222305B2 (en) | 2003-03-13 | 2007-05-22 | Oracle International Corp. | Method of sharing a desktop with attendees of a real-time collaboration |
US20070118904A1 (en) | 2003-06-04 | 2007-05-24 | Microsoft Corporation | Origination/destination features and lists for spam prevention |
US20070136593A1 (en) | 2005-12-14 | 2007-06-14 | Richard Plavcan | Secure information storage apparatus |
US20070143472A1 (en) | 2005-12-21 | 2007-06-21 | International Business Machines Corporation | Method for improving the efficiency and effectiveness of instant messaging based on monitoring user activity |
US20070143851A1 (en) | 2005-12-21 | 2007-06-21 | Fiberlink | Method and systems for controlling access to computing resources based on known security vulnerabilities |
US20070174909A1 (en) | 2005-02-18 | 2007-07-26 | Credant Technologies, Inc. | System and method for intelligence based security |
US7257707B2 (en) | 2001-11-16 | 2007-08-14 | Microsoft Corporation | Manifest-based trusted agent management in a trusted operating system environment |
US20070195779A1 (en) * | 2002-03-08 | 2007-08-23 | Ciphertrust, Inc. | Content-Based Policy Compliance Systems and Methods |
US20070198656A1 (en) | 2006-01-24 | 2007-08-23 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine executing in a terminal services session and hosting a requested computing environment |
US20070214220A1 (en) | 2006-03-09 | 2007-09-13 | John Alsop | Method and system for recognizing desired email |
US20070220319A1 (en) | 2006-02-03 | 2007-09-20 | Emc Corporation | Automatic classification of backup clients |
US7278016B1 (en) | 1999-10-26 | 2007-10-02 | International Business Machines Corporation | Encryption/decryption of stored data using non-accessible, unique encryption key |
US20070245148A1 (en) | 2005-12-31 | 2007-10-18 | Broadcom Corporation | System and method for securing a credential via user and server verification |
US20070256142A1 (en) | 2006-04-18 | 2007-11-01 | Hartung Michael H | Encryption of data in storage systems |
US20070261099A1 (en) * | 2006-05-02 | 2007-11-08 | Broussard Scott J | Confidential content reporting system and method with electronic mail verification functionality |
US20070279668A1 (en) | 2006-01-13 | 2007-12-06 | International Business Machines Corporation | Notification escalation in printing systems |
US20070280112A1 (en) | 2006-05-30 | 2007-12-06 | Danyang Raymond Zheng | System and method for controlling and tracking network content flow |
US7313615B2 (en) | 2003-06-16 | 2007-12-25 | International Business Machines Corporation | Communications management using weights and thresholds |
US20080016341A1 (en) * | 2006-07-12 | 2008-01-17 | Palo Alto Research Center Incorporated. | Method, apparatus, and program product for enabling access to flexibly redacted content |
US20080034224A1 (en) | 2006-08-02 | 2008-02-07 | Bran Ferren | Method and apparatus for protecting data in a portable electronic device |
US20080040358A1 (en) | 2003-11-21 | 2008-02-14 | Guoshun Deng | Data Managing Method in a Removable Storage Device |
US20080065882A1 (en) * | 2006-09-07 | 2008-03-13 | International Business Machines Corporation | Configuring a storage drive to communicate with encryption and key managers |
US20080065903A1 (en) | 2006-09-07 | 2008-03-13 | International Business Machines Corporation | Selective encryption of data stored on removable media in an automated data storage library |
US7346778B1 (en) | 2000-11-29 | 2008-03-18 | Palmsource, Inc. | Security method and apparatus for controlling the data exchange on handheld computers |
US7350074B2 (en) | 2005-04-20 | 2008-03-25 | Microsoft Corporation | Peer-to-peer authentication and authorization |
US7350084B2 (en) | 2001-10-25 | 2008-03-25 | Fujitsu Limited | Data management system, data processing system, and computer-readable medium having on which data management program is recorded |
US20080079730A1 (en) | 2006-09-29 | 2008-04-03 | Microsoft Corporation | Character-level font linking |
US20080083037A1 (en) | 2006-10-03 | 2008-04-03 | Rmcl, Inc. | Data loss and theft protection method |
US20080098237A1 (en) * | 2006-10-20 | 2008-04-24 | Dung Trung T | Secure e-mail services system and methods implementing inversion of security control |
US20080120689A1 (en) | 2006-11-16 | 2008-05-22 | Novell, Inc. | Representing extensible markup language (XML) as an executable having conditional authentication or policy logic |
US7383433B2 (en) | 2001-07-31 | 2008-06-03 | Sun Microsystems, Inc. | Trust spectrum for certificate distribution in distributed peer-to-peer networks |
US20080163332A1 (en) * | 2006-12-28 | 2008-07-03 | Richard Hanson | Selective secure database communications |
US20080170785A1 (en) | 2007-01-15 | 2008-07-17 | Microsoft Corporation | Converting Text |
US20080208988A1 (en) | 2007-02-27 | 2008-08-28 | Cisco Technology, Inc. | Automatic restriction of reply emails |
US20080229428A1 (en) | 2005-03-07 | 2008-09-18 | Noam Camiel | System and Method For a Dynamic Policies Enforced File System For a Data Storage Device |
US7434513B2 (en) | 2001-12-31 | 2008-10-14 | Corning Incorporated | Flexible high density array print head with systems and methods for aligning pin plate, reservoir and substrate with respect to each other |
US7434543B2 (en) | 2005-04-25 | 2008-10-14 | Kvaerner Power Oy | Arrangement in recovery boiler |
US7437752B2 (en) | 2002-09-23 | 2008-10-14 | Credant Technologies, Inc. | Client architecture for portable device with security policies |
US7441000B2 (en) | 2003-12-22 | 2008-10-21 | International Business Machines Corporation | Method for session sharing |
US20080262991A1 (en) | 2005-07-01 | 2008-10-23 | Harsh Kapoor | Systems and methods for processing data flows |
US20080279381A1 (en) | 2006-12-13 | 2008-11-13 | Narendra Siva G | Secure messaging |
US7461249B1 (en) | 1999-08-13 | 2008-12-02 | Hewlett-Packard Development Company, L.P. | Computer platforms and their methods of operation |
US20080309967A1 (en) | 2007-06-14 | 2008-12-18 | Andrew Rodney Ferlitsch | Method and system for remote access and customization of internally generated printing node status report |
US7475420B1 (en) | 2005-01-31 | 2009-01-06 | Symantec Corporation | Detecting network proxies through observation of symmetric relationships |
US7484247B2 (en) | 2004-08-07 | 2009-01-27 | Allen F Rozman | System and method for protecting a computer system from malicious software |
US7490355B2 (en) | 2005-06-16 | 2009-02-10 | Chung Shan Institute Of Science And Technology | Method of detecting network worms |
US20090055536A1 (en) | 2004-10-13 | 2009-02-26 | Bae Su Jo | System and method for plug and play between host and client |
US20090070866A1 (en) * | 2007-09-11 | 2009-03-12 | Erikson Glade | Methods and systems for secure email transmissions |
US7506155B1 (en) | 2000-06-22 | 2009-03-17 | Gatekeeper Llc | E-mail virus protection system and method |
US20090086252A1 (en) | 2007-10-01 | 2009-04-02 | Mcafee, Inc | Method and system for policy based monitoring and blocking of printing activities on local and network printers |
US7523484B2 (en) | 2003-09-24 | 2009-04-21 | Infoexpress, Inc. | Systems and methods of controlling network access |
US7526654B2 (en) | 2001-10-16 | 2009-04-28 | Marc Charbonneau | Method and system for detecting a secure state of a computer system |
US7539857B2 (en) | 2004-10-15 | 2009-05-26 | Protegrity Usa, Inc. | Cooperative processing and escalation in a multi-node application-layer security system and method |
US20090165076A1 (en) * | 2007-12-19 | 2009-06-25 | International Business Machines Corporation | Method, system, and computer program product for data security policy enforcement |
US20090172786A1 (en) | 2007-12-28 | 2009-07-02 | Bruce Backa | Encryption Sentinel System and Method |
US7559080B2 (en) | 2004-05-04 | 2009-07-07 | Microsoft Corporation | Automatically generating security policies for web services |
US20090182931A1 (en) | 2005-08-18 | 2009-07-16 | Olympus Soft Imaging Solutions Gmbh | System including a portable storage device equipped with a user proximity detector and method of preventing the loss thereof |
US7581004B2 (en) | 2006-02-15 | 2009-08-25 | Gabriel Jakobson | System and method for alerting on open file-share sessions on a user's electronic device |
US20090232300A1 (en) | 2008-03-14 | 2009-09-17 | Mcafee, Inc. | Securing data using integrated host-based data loss agent with encryption detection |
US7630986B1 (en) | 1999-10-27 | 2009-12-08 | Pinpoint, Incorporated | Secure data interchange |
US20090327743A1 (en) | 2008-01-18 | 2009-12-31 | Aridian Technology Company, Inc. | Secure portable data transport & storage system |
US7653811B2 (en) | 2004-08-26 | 2010-01-26 | Ricoh Company, Ltd. | Selecting a repository satisfying a security level of data |
US7660845B2 (en) | 2003-08-01 | 2010-02-09 | Sentillion, Inc. | Methods and apparatus for verifying context participants in a context management system in a networked environment |
US7661124B2 (en) | 2004-10-05 | 2010-02-09 | Microsoft Corporation | Rule-driven specification of web service policy |
US7689563B1 (en) | 1998-10-20 | 2010-03-30 | Jacobson Andrea M | Electronic record management system |
US7730040B2 (en) | 2005-07-27 | 2010-06-01 | Microsoft Corporation | Feedback-driven malware detector |
US7742406B1 (en) | 2004-12-20 | 2010-06-22 | Packeteer, Inc. | Coordinated environment for classification and control of network traffic |
US20100174784A1 (en) | 2005-09-20 | 2010-07-08 | Michael Ernest Levey | Systems and Methods for Analyzing Electronic Communications |
US20100250547A1 (en) | 2001-08-13 | 2010-09-30 | Xerox Corporation | System for Automatically Generating Queries |
US7847694B2 (en) | 2005-08-19 | 2010-12-07 | Electronics And Telecommunications Research Institute | Electronic tag including privacy level information and privacy protection apparatus and method using RFID tag |
US7890587B1 (en) | 2006-02-06 | 2011-02-15 | Mcafee, Inc. | System, method and computer program product for correcting a date/time associated with an electronic mail message |
US7940756B1 (en) | 2005-11-23 | 2011-05-10 | Symantec Corporation | Dynamic tagging of network data based on service level objectives |
US20110273554A1 (en) | 2009-01-22 | 2011-11-10 | Leiming Su | Image processing apparatus, biometric authentication apparatus, image processing method and recording medium |
US20120011189A1 (en) | 2010-04-07 | 2012-01-12 | Jeremy Matthew Werner | Apparatus and Method For Matching Users For Online Sessions |
US8103727B2 (en) | 2007-08-30 | 2012-01-24 | Fortinet, Inc. | Use of global intelligence to make local information classification decisions |
US8111413B2 (en) | 2009-02-09 | 2012-02-07 | Ricoh Company, Ltd. | Approach for securely printing policy-enabled electronic documents based on print driver and printing device support |
US8151363B2 (en) | 2006-07-13 | 2012-04-03 | Ricoh Company, Ltd. | Approach for securely processing an electronic document |
US8181036B1 (en) | 2006-09-29 | 2012-05-15 | Symantec Corporation | Extrusion detection of obfuscated content |
US8199965B1 (en) | 2007-08-17 | 2012-06-12 | Mcafee, Inc. | System, method, and computer program product for preventing image-related data loss |
US20120191792A1 (en) | 2008-08-06 | 2012-07-26 | Mcafee, Inc., A Delaware Corporation | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
US8272058B2 (en) | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
US8353053B1 (en) | 2008-04-14 | 2013-01-08 | Mcafee, Inc. | Computer program product and method for permanently storing data based on whether a device is protected with an encryption mechanism and whether data in a data structure requires encryption |
US8452013B2 (en) * | 2007-07-31 | 2013-05-28 | Research In Motion Limited | Secure message handling on a mobile device |
US20130246534A1 (en) | 2007-04-26 | 2013-09-19 | Gopi Krishna Chebiyyam | System, method and computer program product for performing an action based on an aspect of an electronic mail message thread |
US8561127B1 (en) * | 2006-03-01 | 2013-10-15 | Adobe Systems Incorporated | Classification of security sensitive information and application of customizable security policies |
US20130276061A1 (en) | 2007-09-05 | 2013-10-17 | Gopi Krishna Chebiyyam | System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session |
US8590002B1 (en) | 2006-11-29 | 2013-11-19 | Mcafee Inc. | System, method and computer program product for maintaining a confidentiality of data on a network |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5845068A (en) | 1996-12-18 | 1998-12-01 | Sun Microsystems, Inc. | Multilevel security port methods, apparatuses, and computer program products |
US20030043036A1 (en) * | 2001-09-04 | 2003-03-06 | Acco Brands, Inc. | Loss prevention system for portable electronic devices |
US6857330B2 (en) * | 2002-05-31 | 2005-02-22 | General Electric Company | Apparatus and methods for automatically inspecting dovetails on turbine rotors |
-
2008
- 2008-03-14 US US12/076,163 patent/US8893285B2/en active Active
-
2014
- 2014-11-17 US US14/543,869 patent/US9843564B2/en active Active
Patent Citations (223)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4797447A (en) | 1985-08-16 | 1989-01-10 | Shell Oil Company | Impact resistant blends of thermoplastic polyesters and modified block copolymers |
US5195086A (en) | 1990-04-12 | 1993-03-16 | At&T Bell Laboratories | Multiple call control method in a multimedia conferencing system |
US5280527A (en) | 1992-04-14 | 1994-01-18 | Kamahira Safe Co., Inc. | Biometric token for authorizing access to a host system |
US5572694A (en) | 1992-11-25 | 1996-11-05 | Fujitsu Limited | Virtual system for detecting access paths belonging to same group from plurality of access paths to reach device designated by command with reference to table |
US5485068A (en) | 1993-03-15 | 1996-01-16 | Vaught; Michael | Multiple plug-in programmable sensory device system |
US6081265A (en) | 1996-08-30 | 2000-06-27 | Hitachi, Ltd. | System for providing a same user interface and an appropriate graphic user interface for computers having various specifications |
US5796948A (en) | 1996-11-12 | 1998-08-18 | Cohen; Elliot D. | Offensive message interceptor for computers |
US5941915A (en) | 1997-02-18 | 1999-08-24 | Cummins Engine Company, Inc. | System for providing accurately time stamped vehicle operational messages following a real-time clock reset |
US6658566B1 (en) | 1997-03-13 | 2003-12-02 | Bull Cp8 | Process for storage and use of sensitive information in a security module and the associated security module |
US6073142A (en) | 1997-06-23 | 2000-06-06 | Park City Group | Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments |
US6240417B1 (en) | 1997-08-13 | 2001-05-29 | Avaya Technology Corp. | Integration of legacy database management systems with ODBC-compliant application programs |
US5987610A (en) | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems |
US20040255138A1 (en) | 1998-07-29 | 2004-12-16 | Nec Corporation | System and method for distributing digital works, apparatus and method for reproducing digital works, and computer program product |
US6177932B1 (en) | 1998-08-21 | 2001-01-23 | Kana Communications, Inc. | Method and apparatus for network based customer service |
US7689563B1 (en) | 1998-10-20 | 2010-03-30 | Jacobson Andrea M | Electronic record management system |
US6957330B1 (en) | 1999-03-01 | 2005-10-18 | Storage Technology Corporation | Method and system for secure information handling |
US6367019B1 (en) | 1999-03-26 | 2002-04-02 | Liquid Audio, Inc. | Copy security for portable music players |
US6820204B1 (en) | 1999-03-31 | 2004-11-16 | Nimesh Desai | System and method for selective information exchange |
US20060010150A1 (en) | 1999-05-18 | 2006-01-12 | Kom, Inc. | Method and System for Electronic File Lifecycle Management |
US7194623B1 (en) | 1999-05-28 | 2007-03-20 | Hewlett-Packard Development Company, L.P. | Data event logging in computing platform |
US6718367B1 (en) | 1999-06-01 | 2004-04-06 | General Interactive, Inc. | Filter for modeling system and method for handling and routing of text-based asynchronous communications |
US7461249B1 (en) | 1999-08-13 | 2008-12-02 | Hewlett-Packard Development Company, L.P. | Computer platforms and their methods of operation |
US7278016B1 (en) | 1999-10-26 | 2007-10-02 | International Business Machines Corporation | Encryption/decryption of stored data using non-accessible, unique encryption key |
US7630986B1 (en) | 1999-10-27 | 2009-12-08 | Pinpoint, Incorporated | Secure data interchange |
US6741851B1 (en) | 1999-10-30 | 2004-05-25 | Samsung Electronics Co., Ltd. | Method for protecting data stored in lost mobile terminal and recording medium therefor |
US6460050B1 (en) | 1999-12-22 | 2002-10-01 | Mark Raymond Pace | Distributed content identification system |
US20010046069A1 (en) | 2000-02-19 | 2001-11-29 | Jones Kevin C. | Digital watermarks as a gateway and control mechanism |
US20040199555A1 (en) | 2000-03-23 | 2004-10-07 | Albert Krachman | Method and system for providing electronic discovery on computer databases and archives using artificial intelligence to recover legally relevant data |
US6961765B2 (en) | 2000-04-06 | 2005-11-01 | Bbx Technologies, Inc. | System and method for real time monitoring and control of networked computers |
US20050154885A1 (en) | 2000-05-15 | 2005-07-14 | Interfuse Technology, Inc. | Electronic data security system and method |
US20040034794A1 (en) | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US20020046275A1 (en) | 2000-06-12 | 2002-04-18 | Mark Crosbie | System and method for host and network based intrusion detection and response |
US7506155B1 (en) | 2000-06-22 | 2009-03-17 | Gatekeeper Llc | E-mail virus protection system and method |
US20020046575A1 (en) | 2000-08-21 | 2002-04-25 | Hayes Dan M. | Apparatus and method for conveying gobs of glass to a glass container forming machine |
US7149778B1 (en) | 2000-08-24 | 2006-12-12 | Yahoo! Inc. | Unsolicited electronic mail reduction |
US20040027601A1 (en) | 2000-09-22 | 2004-02-12 | Tatsuo Ito | Document acquiring device, document filing system, and electronic document notarizing system |
US20020083003A1 (en) | 2000-09-26 | 2002-06-27 | Halliday David C. | Method and apparatus for the accurate metering of software application usage and the reporting of such usage to a remote site on a public network |
US20020157089A1 (en) | 2000-11-06 | 2002-10-24 | Amit Patel | Client installation and execution system for streamed applications |
US20030182435A1 (en) | 2000-11-13 | 2003-09-25 | Digital Doors, Inc. | Data security system and method for portable device |
US6934857B1 (en) | 2000-11-27 | 2005-08-23 | Networks Associates Technology, Inc. | Security system and method for handheld computers |
US7346778B1 (en) | 2000-11-29 | 2008-03-18 | Palmsource, Inc. | Security method and apparatus for controlling the data exchange on handheld computers |
US7023816B2 (en) | 2000-12-13 | 2006-04-04 | Safenet, Inc. | Method and system for time synchronization |
US20020099944A1 (en) | 2001-01-19 | 2002-07-25 | Bowlin Bradley Allen | Method and apparatus which enable a computer user to prevent unauthorized access to files stored on a computer |
WO2002093410A1 (en) | 2001-05-15 | 2002-11-21 | Metatomix, Inc. | Methods and apparatus for real-time business visibility using persistent schema-less data storage |
US20030043039A1 (en) | 2001-06-11 | 2003-03-06 | Salemi Robert D. | Concealed security tags on bottles |
US20040230572A1 (en) | 2001-06-22 | 2004-11-18 | Nosa Omoigui | System and method for semantic knowledge retrieval, management, capture, sharing, discovery, delivery and presentation |
US7383433B2 (en) | 2001-07-31 | 2008-06-03 | Sun Microsystems, Inc. | Trust spectrum for certificate distribution in distributed peer-to-peer networks |
US20100250547A1 (en) | 2001-08-13 | 2010-09-30 | Xerox Corporation | System for Automatically Generating Queries |
US20030046679A1 (en) | 2001-09-05 | 2003-03-06 | Singleton Richard Brian | Checking computer program installation |
US20030065937A1 (en) | 2001-10-03 | 2003-04-03 | Graphin Co., Ltd. | Outside leakage preventing system of confidential information |
US20030070071A1 (en) * | 2001-10-05 | 2003-04-10 | Erik Riedel | Secure file access control via directory encryption |
US20050038853A1 (en) | 2001-10-05 | 2005-02-17 | Dominique Blanc | Communication of messages in a system |
US7526654B2 (en) | 2001-10-16 | 2009-04-28 | Marc Charbonneau | Method and system for detecting a secure state of a computer system |
US7350084B2 (en) | 2001-10-25 | 2008-03-25 | Fujitsu Limited | Data management system, data processing system, and computer-readable medium having on which data management program is recorded |
US7877616B2 (en) | 2001-10-25 | 2011-01-25 | Fujitsu Limited | Data management system, data processing system, and computer-readable medium having on which data management program is recorded |
US20030133443A1 (en) | 2001-11-02 | 2003-07-17 | Netvmg, Inc. | Passive route control of data networks |
US20030097583A1 (en) | 2001-11-16 | 2003-05-22 | International Business Machines Corporation | Data management system and method |
US20050004359A1 (en) | 2001-11-16 | 2005-01-06 | Rai Bishwa Prakash | Process for the preparation of crystalline imipenem |
US7257707B2 (en) | 2001-11-16 | 2007-08-14 | Microsoft Corporation | Manifest-based trusted agent management in a trusted operating system environment |
US20030105979A1 (en) | 2001-12-05 | 2003-06-05 | Shinji Itoh | Network system enabling transmission control |
US20030177394A1 (en) | 2001-12-26 | 2003-09-18 | Dmitri Dozortsev | System and method of enforcing executable code identity verification over the network |
US7434513B2 (en) | 2001-12-31 | 2008-10-14 | Corning Incorporated | Flexible high density array print head with systems and methods for aligning pin plate, reservoir and substrate with respect to each other |
US20030135744A1 (en) | 2002-01-11 | 2003-07-17 | International Business Machines Corporation | Method and system for programming a non-volatile device in a data processing system |
US7100123B1 (en) | 2002-01-25 | 2006-08-29 | Microsoft Corporation | Electronic content search and delivery based on cursor location |
US20070195779A1 (en) * | 2002-03-08 | 2007-08-23 | Ciphertrust, Inc. | Content-Based Policy Compliance Systems and Methods |
US20030192033A1 (en) | 2002-04-04 | 2003-10-09 | Gartside Paul Nicholas | Validating computer program installation |
US20040010686A1 (en) | 2002-04-18 | 2004-01-15 | Cheh Goh | Apparatus for remote working |
US20030233421A1 (en) | 2002-06-12 | 2003-12-18 | Sharp Kabushiki Kaisha. | Network communication device, communication device, data reception processing method and data transmission processing method, data transmission processing program and data reception processing program, and computer-readable storage medium |
US20040054928A1 (en) | 2002-06-17 | 2004-03-18 | Hall Robert J. | Method and device for detecting computer network intrusions |
US20040064732A1 (en) | 2002-06-17 | 2004-04-01 | Hall Robert J. | Method and device for detecting computer intrusion |
US20040003289A1 (en) * | 2002-06-27 | 2004-01-01 | International Business Machines Corporation | Method and apparatus for handling files containing confidential or sensitive information |
US7519984B2 (en) | 2002-06-27 | 2009-04-14 | International Business Machines Corporation | Method and apparatus for handling files containing confidential or sensitive information |
US20040003255A1 (en) | 2002-06-28 | 2004-01-01 | Storage Technology Corporation | Secure email time stamping |
US20040006715A1 (en) | 2002-07-05 | 2004-01-08 | Skrepetos Nicholas C. | System and method for providing security to a remote computer over a network browser interface |
US20060010209A1 (en) | 2002-08-07 | 2006-01-12 | Hodgson Paul W | Server for sending electronics messages |
US20040111482A1 (en) | 2002-08-13 | 2004-06-10 | Daniela Bourges-Waldegg | Electronic device, method for routing an electronic message from an electronic device to an output unit, and computer program element |
US20040172557A1 (en) | 2002-08-20 | 2004-09-02 | Masayuki Nakae | Attack defending system and attack defending method |
US7124197B2 (en) | 2002-09-11 | 2006-10-17 | Mirage Networks, Inc. | Security apparatus and method for local area networks |
US7437752B2 (en) | 2002-09-23 | 2008-10-14 | Credant Technologies, Inc. | Client architecture for portable device with security policies |
US20040088433A1 (en) | 2002-11-06 | 2004-05-06 | Kaler Christopher G. | Maintaining structured time data for electronic messages |
US20040091177A1 (en) | 2002-11-12 | 2004-05-13 | Eaton Eric T. | Limiting storage or transmission of visual information using optical character recognition |
US7194728B1 (en) | 2002-11-18 | 2007-03-20 | Bmc Software, Inc. | System and method for packaging updates |
US20050272861A1 (en) | 2002-11-27 | 2005-12-08 | Qiao Greg G | Microgel composition and process for preparation thereof |
US20040117802A1 (en) | 2002-12-13 | 2004-06-17 | Green James D | Event monitoring system and method |
US20040146006A1 (en) | 2003-01-24 | 2004-07-29 | Jackson Daniel H. | System and method for internal network data traffic control |
US20060120526A1 (en) | 2003-02-28 | 2006-06-08 | Peter Boucher | Access control to files based on source information |
US7222305B2 (en) | 2003-03-13 | 2007-05-22 | Oracle International Corp. | Method of sharing a desktop with attendees of a real-time collaboration |
US20040199566A1 (en) | 2003-03-14 | 2004-10-07 | International Business Machines Corporation | System, method, and apparatus for policy-based data management |
US20040193904A1 (en) * | 2003-03-25 | 2004-09-30 | International Business Machines Corporation | Data protection system for removable recording medium |
US20040199596A1 (en) * | 2003-04-03 | 2004-10-07 | Daniel Nutkis | Auditor system |
US20050044359A1 (en) | 2003-05-12 | 2005-02-24 | Thomas Eriksson | Anti-piracy software protection system and method |
US20070118904A1 (en) | 2003-06-04 | 2007-05-24 | Microsoft Corporation | Origination/destination features and lists for spam prevention |
US7313615B2 (en) | 2003-06-16 | 2007-12-25 | International Business Machines Corporation | Communications management using weights and thresholds |
US20060021043A1 (en) | 2003-06-20 | 2006-01-26 | Takashi Kaneko | Method of connection of equipment in a network and network system using same |
US20050005145A1 (en) * | 2003-07-02 | 2005-01-06 | Zone Labs, Inc. | System and Methodology Providing Information Lockbox |
US7660845B2 (en) | 2003-08-01 | 2010-02-09 | Sentillion, Inc. | Methods and apparatus for verifying context participants in a context management system in a networked environment |
US20050033810A1 (en) | 2003-08-07 | 2005-02-10 | International Business Machines Corporation | Interceptor for non-subscribed bulk electronic messages |
US20050060643A1 (en) | 2003-08-25 | 2005-03-17 | Miavia, Inc. | Document similarity detection and classification system |
US20050058285A1 (en) | 2003-09-17 | 2005-03-17 | Yosef Stein | Advanced encryption standard (AES) engine with real time S-box generation |
US7523484B2 (en) | 2003-09-24 | 2009-04-21 | Infoexpress, Inc. | Systems and methods of controlling network access |
US7185238B2 (en) * | 2003-09-30 | 2007-02-27 | Sap Ag | Data loss prevention |
US20080040358A1 (en) | 2003-11-21 | 2008-02-14 | Guoshun Deng | Data Managing Method in a Removable Storage Device |
US20070110089A1 (en) | 2003-11-27 | 2007-05-17 | Advestigo | System for intercepting multimedia documents |
US20050116749A1 (en) | 2003-11-28 | 2005-06-02 | Visvesvaraya Pentakota | Low noise output buffer |
US20050131990A1 (en) | 2003-12-04 | 2005-06-16 | Acpana Business Systems Inc. | Data backup system and method |
US20050132184A1 (en) | 2003-12-12 | 2005-06-16 | International Business Machines Corporation | Apparatus, methods and computer programs for controlling performance of operations within a data processing system or network |
US7441000B2 (en) | 2003-12-22 | 2008-10-21 | International Business Machines Corporation | Method for session sharing |
US20110167265A1 (en) | 2004-01-22 | 2011-07-07 | Mcafee, Inc., A Delaware Corporation | Cryptographic policy enforcement |
US20050166066A1 (en) | 2004-01-22 | 2005-07-28 | Ratinder Paul Singh Ahuja | Cryptographic policy enforcement |
US20050198285A1 (en) | 2004-01-27 | 2005-09-08 | Sun Microsystems, Inc. | Overload management in an application-based server |
US20050172140A1 (en) | 2004-01-30 | 2005-08-04 | Matsushita Electric Industrial Co., Ltd. | Encryption device, encryption system including the encryption device, decryption device and a semiconductor system including the decryption device |
GB2411330A (en) | 2004-02-17 | 2005-08-24 | William John Bailey | A means for document security tracking |
US20050204009A1 (en) | 2004-03-09 | 2005-09-15 | Devapratim Hazarika | System, method and computer program product for prioritizing messages |
US20050216749A1 (en) | 2004-03-23 | 2005-09-29 | Network Equipment Technologies | Method and apparatus for detection of hostile software |
US7559080B2 (en) | 2004-05-04 | 2009-07-07 | Microsoft Corporation | Automatically generating security policies for web services |
US20050262208A1 (en) | 2004-05-21 | 2005-11-24 | Eyal Haviv | System and method for managing emails in an enterprise |
US20060031359A1 (en) | 2004-05-29 | 2006-02-09 | Clegg Paul J | Managing connections, messages, and directory harvest attacks at a server |
US20070029744A1 (en) | 2004-06-01 | 2007-02-08 | International Engineering & Manufacturing, Inc. | Snowmobile ski and method |
US7497447B2 (en) | 2004-06-01 | 2009-03-03 | International Engineering & Manufacturing, Inc. | Snowmobile ski and method |
US20060010217A1 (en) | 2004-06-04 | 2006-01-12 | Business Instruments Corp. | System and method for dynamic adaptive user-based prioritization and display of electronic messages |
US20050275861A1 (en) | 2004-06-10 | 2005-12-15 | Ferlitsch Andrew R | Systems and methods for determining when to download a resource to a printing device as part of a print job |
US20060005244A1 (en) | 2004-06-10 | 2006-01-05 | International Business Machines Corporation | Virus detection in a network |
US20050289181A1 (en) | 2004-06-23 | 2005-12-29 | William Deninger | Object classification in a capture system |
US20060026593A1 (en) | 2004-07-30 | 2006-02-02 | Microsoft Corporation | Categorizing, voting and rating community threads |
US7484247B2 (en) | 2004-08-07 | 2009-01-27 | Allen F Rozman | System and method for protecting a computer system from malicious software |
US20060039554A1 (en) | 2004-08-18 | 2006-02-23 | Roxio, Inc. | High security media encryption |
US20060070089A1 (en) | 2004-08-20 | 2006-03-30 | Shahid Shoaib | Method and apparatus for dynamic replacement of device drivers in the operating system (OS) kernel |
US20060041930A1 (en) | 2004-08-23 | 2006-02-23 | Hafeman Joseph E | Accessing personal information |
US7653811B2 (en) | 2004-08-26 | 2010-01-26 | Ricoh Company, Ltd. | Selecting a repository satisfying a security level of data |
US20060059548A1 (en) | 2004-09-01 | 2006-03-16 | Hildre Eric A | System and method for policy enforcement and token state monitoring |
US20060050879A1 (en) | 2004-09-09 | 2006-03-09 | Canon Kabushiki Kaisha | Method and apparatus for encrypted print processing |
US20060075502A1 (en) | 2004-09-27 | 2006-04-06 | Mcafee, Inc. | System, method and computer program product for accelerating malware/spyware scanning |
US20060075040A1 (en) | 2004-09-29 | 2006-04-06 | Mazen Chmaytelli | Message thread handling |
US7661124B2 (en) | 2004-10-05 | 2010-02-09 | Microsoft Corporation | Rule-driven specification of web service policy |
US20090055536A1 (en) | 2004-10-13 | 2009-02-26 | Bae Su Jo | System and method for plug and play between host and client |
US7539857B2 (en) | 2004-10-15 | 2009-05-26 | Protegrity Usa, Inc. | Cooperative processing and escalation in a multi-node application-layer security system and method |
US20060112166A1 (en) | 2004-11-19 | 2006-05-25 | Nancy Pettigrew | System and method for disaster recovery and management of an email system |
US20060123413A1 (en) | 2004-11-30 | 2006-06-08 | International Business Machines Corporation | System and method for installing a software application |
US7725934B2 (en) | 2004-12-07 | 2010-05-25 | Cisco Technology, Inc. | Network and application attack protection based on application layer message inspection |
US20060123479A1 (en) | 2004-12-07 | 2006-06-08 | Sandeep Kumar | Network and application attack protection based on application layer message inspection |
US20060168026A1 (en) | 2004-12-16 | 2006-07-27 | International Business Machines Corporation | System and method enabling interactive electronic mail and real-time messaging |
US7742406B1 (en) | 2004-12-20 | 2010-06-22 | Packeteer, Inc. | Coordinated environment for classification and control of network traffic |
US20060132824A1 (en) | 2004-12-22 | 2006-06-22 | Masanori Aritomi | Information processing apparatus and information processing method |
WO2006076536A2 (en) | 2005-01-14 | 2006-07-20 | Senforce Technologies, Inc. | Access control to files based on source information |
US20060190986A1 (en) | 2005-01-22 | 2006-08-24 | Mont Marco C | System and method for dynamically allocating resources |
US7475420B1 (en) | 2005-01-31 | 2009-01-06 | Symantec Corporation | Detecting network proxies through observation of symmetric relationships |
US20060224589A1 (en) | 2005-02-14 | 2006-10-05 | Rowney Kevin T | Method and apparatus for handling messages containing pre-selected data |
US20070174909A1 (en) | 2005-02-18 | 2007-07-26 | Credant Technologies, Inc. | System and method for intelligence based security |
US20080229428A1 (en) | 2005-03-07 | 2008-09-18 | Noam Camiel | System and Method For a Dynamic Policies Enforced File System For a Data Storage Device |
US7350074B2 (en) | 2005-04-20 | 2008-03-25 | Microsoft Corporation | Peer-to-peer authentication and authorization |
US7434543B2 (en) | 2005-04-25 | 2008-10-14 | Kvaerner Power Oy | Arrangement in recovery boiler |
US20060248252A1 (en) | 2005-04-27 | 2006-11-02 | Kharwa Bhupesh D | Automatic detection of data storage functionality within a docking station |
US7490355B2 (en) | 2005-06-16 | 2009-02-10 | Chung Shan Institute Of Science And Technology | Method of detecting network worms |
US20080262991A1 (en) | 2005-07-01 | 2008-10-23 | Harsh Kapoor | Systems and methods for processing data flows |
US20070022285A1 (en) | 2005-07-21 | 2007-01-25 | Guardianedge Technologies, Inc. | Administration of data encryption in enterprise computer systems |
US20070064883A1 (en) | 2005-07-21 | 2007-03-22 | Lawrence Rosenthal | Techniques for suspended delivery of messages |
US7730040B2 (en) | 2005-07-27 | 2010-06-01 | Microsoft Corporation | Feedback-driven malware detector |
US8272058B2 (en) | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
US20070028112A1 (en) | 2005-07-29 | 2007-02-01 | Mackelden John M | Data transfer device |
US20070033283A1 (en) | 2005-08-04 | 2007-02-08 | Brown Murray J | Method and system for managing electronic communication |
US20090182931A1 (en) | 2005-08-18 | 2009-07-16 | Olympus Soft Imaging Solutions Gmbh | System including a portable storage device equipped with a user proximity detector and method of preventing the loss thereof |
US7847694B2 (en) | 2005-08-19 | 2010-12-07 | Electronics And Telecommunications Research Institute | Electronic tag including privacy level information and privacy protection apparatus and method using RFID tag |
US20100174784A1 (en) | 2005-09-20 | 2010-07-08 | Michael Ernest Levey | Systems and Methods for Analyzing Electronic Communications |
US20070074292A1 (en) | 2005-09-28 | 2007-03-29 | Hitachi, Ltd. | Management of encrypted storage networks |
US20070094394A1 (en) | 2005-10-26 | 2007-04-26 | Mona Singh | Methods, systems, and computer program products for transmission control of sensitive application-layer data |
US20070101419A1 (en) | 2005-10-31 | 2007-05-03 | Dawson Colin S | Apparatus, system, and method for providing electronically accessible personal information |
US7940756B1 (en) | 2005-11-23 | 2011-05-10 | Symantec Corporation | Dynamic tagging of network data based on service level objectives |
US20070136593A1 (en) | 2005-12-14 | 2007-06-14 | Richard Plavcan | Secure information storage apparatus |
US20070143472A1 (en) | 2005-12-21 | 2007-06-21 | International Business Machines Corporation | Method for improving the efficiency and effectiveness of instant messaging based on monitoring user activity |
US20070143851A1 (en) | 2005-12-21 | 2007-06-21 | Fiberlink | Method and systems for controlling access to computing resources based on known security vulnerabilities |
US20070245148A1 (en) | 2005-12-31 | 2007-10-18 | Broadcom Corporation | System and method for securing a credential via user and server verification |
US20070279668A1 (en) | 2006-01-13 | 2007-12-06 | International Business Machines Corporation | Notification escalation in printing systems |
US20070198656A1 (en) | 2006-01-24 | 2007-08-23 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine executing in a terminal services session and hosting a requested computing environment |
US20070220319A1 (en) | 2006-02-03 | 2007-09-20 | Emc Corporation | Automatic classification of backup clients |
US7890587B1 (en) | 2006-02-06 | 2011-02-15 | Mcafee, Inc. | System, method and computer program product for correcting a date/time associated with an electronic mail message |
US7581004B2 (en) | 2006-02-15 | 2009-08-25 | Gabriel Jakobson | System and method for alerting on open file-share sessions on a user's electronic device |
US8561127B1 (en) * | 2006-03-01 | 2013-10-15 | Adobe Systems Incorporated | Classification of security sensitive information and application of customizable security policies |
US20070214220A1 (en) | 2006-03-09 | 2007-09-13 | John Alsop | Method and system for recognizing desired email |
US20070256142A1 (en) | 2006-04-18 | 2007-11-01 | Hartung Michael H | Encryption of data in storage systems |
US20070261099A1 (en) * | 2006-05-02 | 2007-11-08 | Broussard Scott J | Confidential content reporting system and method with electronic mail verification functionality |
US20070280112A1 (en) | 2006-05-30 | 2007-12-06 | Danyang Raymond Zheng | System and method for controlling and tracking network content flow |
US20080016341A1 (en) * | 2006-07-12 | 2008-01-17 | Palo Alto Research Center Incorporated. | Method, apparatus, and program product for enabling access to flexibly redacted content |
US8151363B2 (en) | 2006-07-13 | 2012-04-03 | Ricoh Company, Ltd. | Approach for securely processing an electronic document |
US20080034224A1 (en) | 2006-08-02 | 2008-02-07 | Bran Ferren | Method and apparatus for protecting data in a portable electronic device |
US20080065903A1 (en) | 2006-09-07 | 2008-03-13 | International Business Machines Corporation | Selective encryption of data stored on removable media in an automated data storage library |
US20080065882A1 (en) * | 2006-09-07 | 2008-03-13 | International Business Machines Corporation | Configuring a storage drive to communicate with encryption and key managers |
US8181036B1 (en) | 2006-09-29 | 2012-05-15 | Symantec Corporation | Extrusion detection of obfuscated content |
US20080079730A1 (en) | 2006-09-29 | 2008-04-03 | Microsoft Corporation | Character-level font linking |
US20080083037A1 (en) | 2006-10-03 | 2008-04-03 | Rmcl, Inc. | Data loss and theft protection method |
US20080098237A1 (en) * | 2006-10-20 | 2008-04-24 | Dung Trung T | Secure e-mail services system and methods implementing inversion of security control |
US20080120689A1 (en) | 2006-11-16 | 2008-05-22 | Novell, Inc. | Representing extensible markup language (XML) as an executable having conditional authentication or policy logic |
US8590002B1 (en) | 2006-11-29 | 2013-11-19 | Mcafee Inc. | System, method and computer program product for maintaining a confidentiality of data on a network |
US20080279381A1 (en) | 2006-12-13 | 2008-11-13 | Narendra Siva G | Secure messaging |
US20080163332A1 (en) * | 2006-12-28 | 2008-07-03 | Richard Hanson | Selective secure database communications |
US20080170785A1 (en) | 2007-01-15 | 2008-07-17 | Microsoft Corporation | Converting Text |
US20080208988A1 (en) | 2007-02-27 | 2008-08-28 | Cisco Technology, Inc. | Automatic restriction of reply emails |
US8943158B2 (en) | 2007-04-26 | 2015-01-27 | Mcafee, Inc. | System, method and computer program product for performing an action based on an aspect of an electronic mail message thread |
US20140115086A1 (en) | 2007-04-26 | 2014-04-24 | Gopi Krishna Chebiyyam | System, Method and Computer Program Product for Performing an Action Based On An Asepct of An Electronic Mail Message Thread |
US20130246534A1 (en) | 2007-04-26 | 2013-09-19 | Gopi Krishna Chebiyyam | System, method and computer program product for performing an action based on an aspect of an electronic mail message thread |
US8621008B2 (en) | 2007-04-26 | 2013-12-31 | Mcafee, Inc. | System, method and computer program product for performing an action based on an aspect of an electronic mail message thread |
US20080309967A1 (en) | 2007-06-14 | 2008-12-18 | Andrew Rodney Ferlitsch | Method and system for remote access and customization of internally generated printing node status report |
US8452013B2 (en) * | 2007-07-31 | 2013-05-28 | Research In Motion Limited | Secure message handling on a mobile device |
US20160171242A1 (en) | 2007-08-17 | 2016-06-16 | Mcafee, Inc. | System, method, and compuer program product for preventing image-related data loss |
US8199965B1 (en) | 2007-08-17 | 2012-06-12 | Mcafee, Inc. | System, method, and computer program product for preventing image-related data loss |
US20120183174A1 (en) | 2007-08-17 | 2012-07-19 | Mcafee, Inc. | System, method, and computer program product for preventing image-related data loss |
US8103727B2 (en) | 2007-08-30 | 2012-01-24 | Fortinet, Inc. | Use of global intelligence to make local information classification decisions |
US20130276061A1 (en) | 2007-09-05 | 2013-10-17 | Gopi Krishna Chebiyyam | System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session |
US20140283145A1 (en) | 2007-09-05 | 2014-09-18 | Gopi Chebiyyam | System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session |
US20090070866A1 (en) * | 2007-09-11 | 2009-03-12 | Erikson Glade | Methods and systems for secure email transmissions |
US20090086252A1 (en) | 2007-10-01 | 2009-04-02 | Mcafee, Inc | Method and system for policy based monitoring and blocking of printing activities on local and network printers |
US8446607B2 (en) | 2007-10-01 | 2013-05-21 | Mcafee, Inc. | Method and system for policy based monitoring and blocking of printing activities on local and network printers |
US20090165076A1 (en) * | 2007-12-19 | 2009-06-25 | International Business Machines Corporation | Method, system, and computer program product for data security policy enforcement |
US20090172786A1 (en) | 2007-12-28 | 2009-07-02 | Bruce Backa | Encryption Sentinel System and Method |
US20090327743A1 (en) | 2008-01-18 | 2009-12-31 | Aridian Technology Company, Inc. | Secure portable data transport & storage system |
US20090232300A1 (en) | 2008-03-14 | 2009-09-17 | Mcafee, Inc. | Securing data using integrated host-based data loss agent with encryption detection |
US8893285B2 (en) | 2008-03-14 | 2014-11-18 | Mcafee, Inc. | Securing data using integrated host-based data loss agent with encryption detection |
US8353053B1 (en) | 2008-04-14 | 2013-01-08 | Mcafee, Inc. | Computer program product and method for permanently storing data based on whether a device is protected with an encryption mechanism and whether data in a data structure requires encryption |
US8713468B2 (en) | 2008-08-06 | 2014-04-29 | Mcafee, Inc. | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
US20120191792A1 (en) | 2008-08-06 | 2012-07-26 | Mcafee, Inc., A Delaware Corporation | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
US20160006680A1 (en) | 2008-08-06 | 2016-01-07 | Mcafee, Inc. | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
US20110273554A1 (en) | 2009-01-22 | 2011-11-10 | Leiming Su | Image processing apparatus, biometric authentication apparatus, image processing method and recording medium |
US8111413B2 (en) | 2009-02-09 | 2012-02-07 | Ricoh Company, Ltd. | Approach for securely printing policy-enabled electronic documents based on print driver and printing device support |
US20120011189A1 (en) | 2010-04-07 | 2012-01-12 | Jeremy Matthew Werner | Apparatus and Method For Matching Users For Online Sessions |
Non-Patent Citations (106)
Title |
---|
Advisory Action in U.S. Appl. No. 11/740,844 dated Apr. 27, 2011. |
Advisory Action in U.S. Appl. No. 11/740,844 dated Mar. 25, 2010. |
Advisory Action in U.S. Appl. No. 12/102,526 dated Aug. 1, 2011. |
ClearContext, www.clearcontext.com/user-guide/; [available online at URL <http://web.archive.org/20061107135010/http://www.clearcontext.com/user-guide/>], Nov. 7, 2006 (pp. 1-24). |
ClearContext, www.clearcontext.com/user—guide/; [available online at URL <http://web.archive.org/20061107135010/http://www.clearcontext.com/user—guide/>], Nov. 7, 2006 (pp. 1-24). |
Dabbish, et al., "Understanding Email Use: Predicting Action on a Message," CHI 2005-Papers: Email and Security, Portland Oregon; available online at URL: <http://www.cs.cmu.edu/˜kraut/Rkraut.site.files/articles/dabbish05-UnderstandingEmailUse.pdf>] Apr. 2-7, 2005 (pp. 691-700). |
Dabbish, et al., "Understanding Email Use: Predicting Action on a Message," CHI 2005—Papers: Email and Security, Portland Oregon; available online at URL: <http://www.cs.cmu.edu/˜kraut/Rkraut.site.files/articles/dabbish05-UnderstandingEmailUse.pdf>] Apr. 2-7, 2005 (pp. 691-700). |
Faith M. Heikkila, "Encryption: Security Considerations for Portable Media Devices" , Cryptography, IEEE Computer Society, 1540-7993/07 © 2007 IEEE, pp. 22-27. |
Final Office Action for U.S. Appl. No. 13/429,363 dated Mar. 21, 2014. |
Final Office Action in U.S. Appl. No. 11/473,930 dated Aug. 8, 2012. |
Final Office Action in U.S. Appl. No. 11/473,930 dated Jul. 16, 2013. |
Final Office Action in U.S. Appl. No. 11/473,930 dated Sep. 14, 2011. |
Final Office Action in U.S. Appl. No. 11/546,745 dated Oct. 21, 2010. |
Final Office Action in U.S. Appl. No. 11/564,745 dated Jun. 4, 2012. |
Final Office Action in U.S. Appl. No. 11/740,844 dated Aug. 15, 2012. |
Final Office Action in U.S. Appl. No. 11/740,844 dated Feb. 16, 2012. |
Final Office Action in U.S. Appl. No. 11/740,844 dated Feb. 18, 2011. |
Final Office Action in U.S. Appl. No. 11/740,844 dated Jan. 11, 2010. |
Final Office Action in U.S. Appl. No. 11/840,831 dated Dec. 21, 2011. |
Final Office Action in U.S. Appl. No. 11/840,831 dated May 5, 2011. |
Final Office Action in U.S. Appl. No. 11/905,420 dated Nov. 2, 2011. |
Final Office Action in U.S. Appl. No. 12/076,163 dated Mar. 18, 2014, 76 pages. |
Final Office Action in U.S. Appl. No. 12/076,163 dated Mar. 25, 2013. |
Final Office Action in U.S. Appl. No. 12/076,163 dated Oct. 19, 2011. |
Final Office Action in U.S. Appl. No. 12/102,526 dated May 25, 2011. |
Final Office Action in U.S. Appl. No. 13/429,363 dated Jan. 27, 2015, 14 pages. |
Final Office Action in U.S. Appl. No. 13/434,777 dated Feb. 12, 2013. |
Final Office Action received for U.S. Appl. No. 11/850,432 dated Jan. 31, 2014. 19 pages. |
Final Office Action received in U.S. Appl. No. 11/850,432 dated May 10, 2011, 14 pages. |
Final Rejection in U.S. Appl. No. 11/349,479 dated Jun. 10, 2009. |
Fumera, G. et al., "Spam Filtering Based on the Analysis of Text Information Embedded into Images," Journal of Machine Learning Research, Dec. 2006, 22 pages. |
George Lawton, New Technology Prevents Data Leakage, pp. 14-17, IEEE Computer Society, 2008. * |
Hangbae Chang et al., "Design of Inside Information Leakage Prevention System in Ubiquitous Computing Environment", O. Gervasi et al. (Eds.): ICCSA 2005, LNCS 3483, pp. 128-137, 2005 © Springer-Verlag Berlin Heidelberg 2005. |
Heikkila, Faith M., "Encryption: Security Considerations for Portable Media Devices," IEEE Computer Society, IEEE Security & Privacy, Jul./Aug. 2007 (pp. 22-27). |
Layland, Robin, "Data Leak Prevention: Coming Soon to a Business Near You," Business Communications Review, May 2007 (pp. 44-49). |
Masaru Takesue, "A Scheme for Protecting the Information Leakage via Portable Devices", International Confererence on Emerging Security Information, System and Technologies, 0-7695-2989-5/07 © 2007 IEEE, pp. 54-59. |
Mingdi Xu et al., "A New Data Protecting Scheme Based on TPM", 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 0-7695-2909-7/07 © 2007 IEEE, pp. 943-947. |
Morejon, Mario, "Review: Remote Desktop Support Out of the Box", CRN, May 21, 2007, 2 pages. |
Non-Final Office Action for U.S. Appl. No. 13/429,363 dated Sep. 23, 2013. |
Non-Final Office Action in U.S. Appl. No. 11/473,930 dated Aug. 17, 2009. |
Non-Final Office Action in U.S. Appl. No. 11/473,930 dated Feb. 4, 2013. |
Non-Final Office Action in U.S. Appl. No. 11/473,930 dated Jan. 26, 2010. |
Non-Final Office Action in U.S. Appl. No. 11/473,930 dated Jul. 16, 2010. |
Non-Final Office Action in U.S. Appl. No. 11/473,930 dated Mar. 1, 2012. |
Non-Final Office Action in U.S. Appl. No. 11/473,930 dated Mar. 10, 2011. |
Non-Final Office Action in U.S. Appl. No. 11/546,745 dated Apr. 21, 2010. |
Non-Final Office Action in U.S. Appl. No. 11/546,745 dated Nov. 2, 2009. |
Non-Final Office Action in U.S. Appl. No. 11/564,745 dated Apr. 5, 2013. |
Non-Final Office Action in U.S. Appl. No. 11/564,745 dated Jan. 19, 2012. |
Non-Final Office Action in U.S. Appl. No. 11/740,844 dated Jul. 20, 2011. |
Non-Final Office Action in U.S. Appl. No. 11/740,844 dated Jun. 24, 2010. |
Non-Final Office Action in U.S. Appl. No. 11/740,844 dated May 10, 2012. |
Non-Final Office Action in U.S. Appl. No. 11/740,844 dated May 14, 2009. |
Non-Final Office Action in U.S. Appl. No. 11/740,844 dated May 3, 2013. |
Non-Final Office Action in U.S. Appl. No. 11/840,831 dated Jul. 21, 2011. |
Non-Final Office Action in U.S. Appl. No. 11/840,831, dated Oct. 12, 2010. |
Non-Final Office Action in U.S. Appl. No. 11/905,420 dated Jul. 23, 2011. |
Non-Final Office Action in U.S. Appl. No. 11/905,420 dated May 23, 2011. |
Non-Final Office Action in U.S. Appl. No. 12/076,163 dated Apr. 28, 2011. |
Non-Final Office Action in U.S. Appl. No. 12/076,163 dated Sep. 10, 2013. |
Non-Final Office Action in U.S. Appl. No. 12/076,163 dated Sep. 4, 2012. |
Non-Final Office Action in U.S. Appl. No. 12/102,526 dated Nov. 24, 2010. |
Non-Final Office Action in U.S. Appl. No. 12/187,207 dated Mar. 25, 2011. |
Non-Final Office Action in U.S. Appl. No. 12/187,207 dated Sep. 17, 2014, 16 pages. |
Non-Final Office Action in U.S. Appl. No. 13/429,363 dated Jul. 30, 2014, 11 pages. |
Non-Final Office Action in U.S. Appl. No. 13/434,777 dated Aug. 20, 2012. |
Non-Final Office Action in U.S. Appl. No. 13/434,777 dated May 23, 2013. |
Non-Final Office Action in U.S. Appl. No. 14/144,136 dated Jun. 2, 2014, 39 pages. |
Non-Final Office Action in U.S. Appl. No. 14/792,521 dated Apr. 22, 2016; 23 pages. |
Non-Final Office Action in U.S. Appl. No. 14/968,337 dated May 23, 2017, 25 pages. |
Non-Final Office Action received for U.S. Appl. No. 11/850,432 dated Oct. 7, 2010. 13 pages. |
Non-Final Office Action received for U.S. Appl. No. 12/102,625 dated Feb. 6, 2012, 16 pages. |
Non-Final Office Action received fur U.S. Appl. No. 11/850,432 dated Jul. 16, 2013. 17 pages. |
Non-Final Rejection in U.S. Appl. No. 11/349,479 dated Dec. 8, 2008. |
Non-Final Rejection in U.S. Appl. No. 11/349,479 dated Mar. 22, 2010. |
Notice of Allowance in U.S. Appl. No. 11/349,479 dated Nov. 8, 2010. |
Notice of Allowance in U.S. Appl. No. 11/564,745 dated Jul. 29, 2013. |
Notice of Allowance in U.S. Appl. No. 11/740,844 dated Sep. 5, 2013. |
Notice of Allowance in U.S. Appl. No. 11/840,831 dated Apr. 3, 2012. |
Notice of Allowance in U.S. Appl. No. 11/840,831 dated Mar. 16, 2012. |
Notice of Allowance in U.S. Appl. No. 11/840,831 dated May 9, 2012. |
Notice of Allowance in U.S. Appl. No. 11/905,420 dated Dec. 6, 2012. |
Notice of Allowance in U.S. Appl. No. 12/076,163 dated Jul. 18, 2014, 27 pages. |
Notice of Allowance in U.S. Appl. No. 12/102,526 dated Sep. 21, 2012. |
Notice of Allowance in U.S. Appl. No. 12/187,207 dated Aug. 24, 2011. |
Notice of Allowance in U.S. Appl. No. 12/187,207 dated Sep. 11, 2012. |
Notice of Allowance in U.S. Appl. No. 14/144,136 dated Sep. 17, 2014, 12 pages. |
Notice of Allowance mailed in U.S. Appl. No. 13/434,777 dated Dec. 17, 2013. |
Notice of Allowance mailed in U.S. Appl. No. 14/792,521 dated Aug. 26, 2016. |
Notice of Appeal in U.S. Appl. No. 11/349,479 dated Dec. 10, 2009. |
Peter Hannay et al., "Pocket SDV with SD Guardian: A Secure & Forensically Safe Portable Execution Environment", Edith Cowan University, Australian Digital Forensics Conference, Security Research Institute Conferences, Dec. 3, 2007, http://ro.edu.edu.au/adf/17, 11 pages. |
Response to Non-Final Action dated Mar. 22, 2010 in U.S. Appl. No. 11/349,479, filed Jul. 22, 2010. |
Robin Layland, "Data Leak Prevention: Coming Soon to a Business Near You", Business Communications Review, May 2007, pp. 44-49. |
U.S. Appl. No. 11/210,321, filed Aug. 23, 2005. |
U.S. Appl. No. 11/349,479, filed Feb. 6, 2006. |
U.S. Appl. No. 11/473,930, filed Jun. 23, 2006. |
U.S. Appl. No. 11/546,745, filed Nov. 29, 2006. |
U.S. Appl. No. 11/740,844, filed Apr. 26, 2007. |
U.S. Appl. No. 11/840,831, filed Aug. 17, 2007. |
U.S. Appl. No. 11/850,432, filed Sep. 5, 2007. |
U.S. Appl. No. 12/102,526, filed Apr. 14, 2008, entitled Computer Program Product and Method for Permanently Storing Data Based on Whether a Device is Protected with an Encryption Mechanism and Whether Data in a Data Structure Requires Encryption, inventor Gopi Krishna Chebiyyam. |
U.S. Appl. No. 12/123,370, filed May 19, 2008. |
U.S. Appl. No. 13/429,363 entitled "System, Method, and Computer Program Product for Preventing Image-Related Data Loss", filed Mar. 24, 2012. |
U.S. Appl. No. 13/434,777, filed Mar. 29, 2012, entitled "System, Method, and Computer Program Product for Determining Whether an Electronic Mail Message is Compliant with an Etiquette Policy", Inventor Gopi Krishna Chebiyyam. |
U.S. Appl. No. 14/144,136, filed Dec. 30, 2013, 27 pages. |
U.S. Appl. No. 14/606,915, filed Jan. 27, 2015, xx pages. |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11645404B2 (en) | 2007-09-05 | 2023-05-09 | Mcafee, Llc | System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session |
US11546355B2 (en) | 2020-07-28 | 2023-01-03 | Bank Of America Corporation | Supplemental attack surface scanner |
Also Published As
Publication number | Publication date |
---|---|
US20150074405A1 (en) | 2015-03-12 |
US8893285B2 (en) | 2014-11-18 |
US20090232300A1 (en) | 2009-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9843564B2 (en) | Securing data using integrated host-based data loss agent with encryption detection | |
US8484327B2 (en) | Method and system for generic real time management of devices on computers connected to a network | |
US20210049276A1 (en) | Automatic detection of software that performs unauthorized privilege escalation | |
US20110239306A1 (en) | Data leak protection application | |
US10079835B1 (en) | Systems and methods for data loss prevention of unidentifiable and unsupported object types | |
US9348984B2 (en) | Method and system for protecting confidential information | |
US8281410B1 (en) | Methods and systems for providing resource-access information | |
US8978092B2 (en) | Data leak prevention from a device with an operating system | |
US10783041B2 (en) | Backup and recovery of data files using hard links | |
US9953158B1 (en) | Systems and methods for enforcing secure software execution | |
US11977494B2 (en) | Providing a secure communication channel between kernel and user mode components | |
US7665139B1 (en) | Method and apparatus to detect and prevent malicious changes to tokens | |
US7899782B1 (en) | Security system for synchronization of desktop and mobile device data | |
US11221968B1 (en) | Systems and methods for shadow copy access prevention | |
US20180026986A1 (en) | Data loss prevention system and data loss prevention method | |
US20110126293A1 (en) | System and method for contextual and behavioral based data access control | |
KR100919643B1 (en) | Separator of the internal/external network throughout the dual indepentent environment and th controlling method thereof | |
US7487548B1 (en) | Granular access control method and system | |
US7484239B1 (en) | Detecting heap and stack execution in the operating system using regions | |
EP4024248B1 (en) | Systems and methods for preventing injections of malicious processes in software | |
US9552491B1 (en) | Systems and methods for securing data | |
US10460100B2 (en) | Injection of data flow control objects into application processes | |
US11989309B2 (en) | Software type and version identification for security operations | |
US11983272B2 (en) | Method and system for detecting and preventing application privilege escalation attacks | |
KR100985073B1 (en) | Network shared folder access control device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MCAFEE, LLC, CALIFORNIA Free format text: CHANGE OF NAME AND ENTITY CONVERSION;ASSIGNOR:MCAFEE, INC.;REEL/FRAME:043665/0918 Effective date: 20161220 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND Free format text: SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:045056/0676 Effective date: 20170929 Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:045055/0786 Effective date: 20170929 |
|
AS | Assignment |
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045056 FRAME 0676. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:054206/0593 Effective date: 20170929 Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045055 FRAME 786. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:055854/0047 Effective date: 20170929 |
|
AS | Assignment |
Owner name: MCAFEE, LLC, CALIFORNIA Free format text: RELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045055/0786;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:054238/0001 Effective date: 20201026 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: MCAFEE, LLC, CALIFORNIA Free format text: RELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045056/0676;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT;REEL/FRAME:059354/0213 Effective date: 20220301 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT AND COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:059354/0335 Effective date: 20220301 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE THE PATENT TITLES AND REMOVE DUPLICATES IN THE SCHEDULE PREVIOUSLY RECORDED AT REEL: 059354 FRAME: 0335. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:060792/0307 Effective date: 20220301 |